jt421 / Jeffrey Tumavitch

There are no people in jt421’s collective.

Huffduffed (62) activity chart

  1. Social Engineering

    People have been known to come to HOPE just for this panel, in which the history, stories, and demonstrations of social engineering are laid out for all to see – and hear. Something will invariably be revealed over the telephone by someone who really should know better in our traditional live demonstration that never fails to entertain.

    —Huffduffed by jt421

  2. Lock Bypass without Lockpicks

    You train as hard as you can, picking lock after lock, learning about all the different picks, different picking techniques and styles, anti-picking features, and how to manipulate them… then some guy with a screwdriver takes the hinges off the door faster than you can pick the doorknob. That’s right, there are ways to bypass locks which don’t involve direct manipulation of the pins, and they not only tend to be easy, but fast. This talk follows the story of Waldo, one hard-to-find hacker trying to wrestle the truth from the jaws of a shady corporation peddling suspicious medication. Waldo, having been captured and stripped of his picks, must escape using only his wits, and whatever he can find on his way out.

    —Huffduffed by jt421

  3. Informants: Villains or Heroes?

    We’ve all seen the headlines and know that much of the controversy has a presence right here at HOPE. For those who don’t know, or who just want a summary, one of our keynote speakers, Julian Assange, the main force behind whistleblower site wikileaks.org, became a marked man after one of his sources was allegedly identified by someone within the hacker community. The leaker had reportedly boasted to hacker Adrian Lamo (after seeing his name in a Wired article) about sending 260,000 U.S. State Department classified documents to wikileaks.org. According to Lamo, that claim was enough to make him decide to call the authorities and become an informant. The U.S. government became extremely interested in finding out whether Assange had these documents at wikileaks.org and it became abundantly clear that his appearance in the States to speak at HOPE would lead to interrogations, detainment, and possibly worse. At press time, the alleged leaker (an Army intelligence analyst), was being held incommunicado in a U.S. Army brig in Kuwait pending charges.

    Our community has been thrust into the middle of this global controversy due to the multiple connections to the various players. There are a number of contentious questions and issues that we’re all dealing with right now. Was the leaker a hero for releasing information, including a widely sought video of U.S. troops killing unarmed Reuters staffers? Was Lamo a hero for turning someone in who was leaking classified information? Is wikileaks.org a vital resource or a threat to society? How should we as a community deal with this? And is this story being reported accurately and fairly?

    Join us for what will be a most fascinating and enlightening panel discussion where you’ll hear firsthand perspectives on the issues of leaking information and turning people in, subjects that have always been of great interest to those in the hacker world. If you made plans to go home Sunday afternoon, this is worth rescheduling your trip and paying any penalties involved. Trust us.

    —Huffduffed by jt421

  4. GPS – It’s Not the Satellites That Know Where You Are

    There are a lot of misconceptions surrounding GPS technology and how it enters into our daily lives. Cheshire will spend this hour addressing some of this and answering all manner of questions on surveillance, new and old technology, and all sorts of other related topics.

    —Huffduffed by jt421

  5. Easy Hacks on Telephone Entry Systems

    Telephone entry systems are practically everywhere in the city. An investigation after a series of break-ins uncovered several shockingly simple bypass techniques currently used by criminals. This presentation explains how the common keypad box will grant full access to a building in under ten seconds using only basic tools. The presentation will also give details on a series of countermeasures that can significantly reduce the vulnerabilities.

    —Huffduffed by jt421

  6. Cats and Mice: The Phone Company, the FBI, and the Phone Phreaks

    Ever since the first blue box arrest in 1961, the telephone company, the FBI, and the phone phreaks engaged in a long-running game of cat and mouse. This talk explores the moves and countermoves between the two sides from 1960 to 1980, covering advances in phreaking – new ways to hack the phone system and evade detection – as well as advances in finding and prosecuting those pesky phone phreaks. Based on exclusive interviews with phreaks, FBI agents, and telephone company security officers for his forthcoming book on the history of phone phreaking, Phil will focus on some of the more dramatic battles between the two sides that occurred during the heyday of analog phone phreaking, including the 1962 Harvard “spy ring,” a certain well-known phone phreak’s wiretapping of the FBI in 1975 (yes, you read that right), and the hacking of the military’s AUTOVON telephone network in the mid-1970s.

    —Huffduffed by jt421

  7. Buying Privacy in Digitized Cities

    As new sensing technologies appear in our cities almost overnight, what does it mean to be visible or invisible? What happens when socioeconomic categories determine when, where, and how you’re seen? The asymmetry in who is visible, and where, is a long-standing urban problem, but it is now being built into our technologies and our cities.

    The worlds of advertising, city planning, and law enforcement are each creating their own inconsistent visions. Privacy is not dead; rather, it is being selectively vivisected. What can we do to fix this? In this talk, a lot of problems and a few solutions will be covered, including the announcement of a new competition for the development of tactical countersurveillance tools.

    —Huffduffed by jt421

  8. “Brilliants Exploits” – A Look at the Vancouver 2010 Olympics

    With the 2010 Winter Olympics having come and gone, it’s not too late to look back at what an event it was. From a technology standpoint, CCTV cameras and ticket sales will be looked at, and from a social standpoint, matters involving intellectual property as well as the police will be examined.

    —Huffduffed by jt421

  9. American Bombe: How the U.S. Shattered the Enigma Code

    Many people know the story of Alan Turing and his work at Bletchley Park in designing the British bombes, the machines used to crack the German Enigma codes. What most people don’t know is what happened afterward. When the German military added a fourth rotor to the Enigma, a new type of machine was needed in order to crack the codes and keep Allied intelligence out of darkness. These American bombes were the first multifunction computers ever built, and are an important part of the history of modern computing. It’s the incredible, gripping story of an enterprise that rivaled the Manhattan Project in secrecy and complexity, and ultimately led to the first modern digital computer.

    —Huffduffed by jt421

  10. three point Oh.

    —Huffduffed by jt421

Page 2 of 7Newer Older